Identity & Access Management systems hold the information to some of a company’s most valuable data and critical systems, so management must calculate the potential risks of centralizing critical data so that appropriate countermeasures can be implemented. Unchecked or mismanaged exceptions and exemptions to Identity & Access Management policies and rules are the most common reasons for compromised data. It needs to be forethought and collaborated across departments to manage them properly.